Toggle light / dark theme

Kuwait has become the first country to make DNA testing mandatory for all residents

In a controversial move, Kuwait has passed a law making it mandatory for all its 1.3 million citizens and 2.9 million foreign residents to have their DNA entered onto a national database.

Anyone who refuses to submit their DNA for testing risks one year in prison and a fine of up to US$33,000, and those who provide a fake sample can be jailed for seven years.

The decision came after an Islamic State-led suicide bombing in Kuwait City on 26 June, which killed 26 people and wounded 227 more. The government hopes that the new database, which is projected to cost around US$400 million, will make it quicker and easier to make arrests in the future.

Ask Ray | Ethan Kurzweil debates the role of tech firms in personal privacy

Dear readers,

My son Ethan Kurzweil — who is a partner at Bessemer Ventures Partners — tracks the future of web innovation, social and legal concerns about privacy, and start-ups who have an edge with their business or consumer applications, like team sourcing or software-as-a-service.

He appeared on C • NBC business affairs show Power Lunch. Episode debated the recent news about the US government and law enforcement asking Apple to release private data on an iPhone used by terrorists.

Is San Bernardino iPhone Fully Encrypted?

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Mitch Vogel is an Apple expert. As both a former police officer and one who has worked with Apple he succinctly explains the current standoff between FBI investigators and Apple.


The iPhone that the FBI has is locked with a passcode and encrypted. It can only be decrypted with the unique code. Not even Apple has that code or can decrypt it. Unlike what you see in the movies, it’s not possible for a really skilled hacker to say “It’s impossible“” and then break through it with enough motivation. Encryption really is that secure and it’s really impossible to break without the passcode.

What the FBI wants to do is brute force the passcode by trying every possible combination until they guess the right one. However, to prevent malicious people from using this exact technique, there is a security feature that erases the iPhone after 10 attempts or locks it for incrementally increasing time periods with each attempt. There is no way for the FBI (or Apple) to know if the feature that erases the iPhone after 10 tries is enabled or not, so they don’t even want to try and risk it.

oceans_of_data-sSo the FBI wants Apple to remove that restriction. That is reasonable. They should, if it is possible to do so without undue burden. The FBI should hand over the iPhone to Apple and Apple should help them to crack it.

However, this isn’t what the court order is asking Apple to do. The FBI wants Apple to create software that disables this security feature on any iPhone and give it to them. Even if it’s possible for this software to exist, it’s not right for the FBI to have it in their possession. They should have to file a court order every single time they use it. The FBI is definitely using this situation as an opportunity to create a precedent and give it carte blanche to get into any iPhone without due process.

So the answer to your question is that yes it is that secure and yes, it’s a ploy by the FBI. Whether it’s actually possible for Apple to help or not is one question and whether they should is another. Either way, the FBI should not have that software.

Caterpillar’s New S60 Is the First Smartphone With FLIR Thermal Imaging Built Right In

Once strictly an extremely expensive tool used only by law enforcement and the military, thermal cameras are now accessible to anyone with a smartphone and a $250 accessory. But starting with Caterpillar’s new rugged S60, thermal imaging sensors are starting to be built right into smartphones.

The FLIR ONE thermal camera started life as a bulky case for the iPhone 5, but was eventually streamlined into a compact dongle that connected to the microUSB or Apple Lightning port on the bottom of iOS or Android smartphones. With the new CAT S60 smartphone, however, the Lepton sensor that allows FLIR cameras to see in total darkness has finally been integrated into the device itself, alongside its standard rear camera.

Read more

Anti-drone rifle shoots down UAVs with radio waves

While the US military continues to develop new and awesome ways of blowing aerial drones to smithereens, not many of these systems can easily be adapted to use in the civilian realm. That’s why Battelle has developed the DroneDefender, a shoulder-mounted rifle that knocks UAVs offline with a barrage of radio waves.

“It can help us in numerous settings, from the White House lawn to bases and embassies overseas; from prisons and schools to historic sites,” Alex Morrow, technical director on the project, said in a statement. “It easily and reliably neutralizes the threat.” The weapon weighs roughly 10 pounds and can target drones up to 400 meters away. When the trigger is pulled, the gun emits a blast of electromagnetic energy tuned to the most common GPS and ISM frequencies, safely disabling the drone and preventing it from accepting any additional commands from its operator. This is especially helpful if the drone is equipped with an improvised explosive device.

Read more

Meanwhile in the Future: You Can Live for 300 Years, But You’ll Be in Prison

What if “life in prison” could mean 100 or 200 or 400 years? Does that change the way that sentences are doled out? What happens when a person gets out of prison?

For all of you who’ve written in asking me to do an episode about longevity, this episode is for you. But instead of looking at the usual living forever stuff, we’re specifically going to talk about what happens when it gets applied to the prison system.

Read more

Accelerated modern human–induced species losses: Entering the sixth mass extinction | Science Advances

“The evidence is incontrovertible that recent extinction rates are unprecedented in human history and highly unusual in Earth’s history. Our analysis emphasizes that our global society has started to destroy species of other organisms at an accelerating rate, initiating a mass extinction episode unparalleled for 65 million years. If the currently elevated extinction pace is allowed to continue, humans will soon (in as little as three human lifetimes) be deprived of many biodiversity benefits.”

Read more

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Review: When Google Met WikiLeaks (2014) by Julian Assange

Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.
As should be of greatest interest to technology enthusiasts, we revisit some of the uplifting ideas from Assange’s philosophy that I picked out from among the otherwise dystopian high-tech future predicted in Cypherpunks (2012). Assange sees the Internet as “transitioning from an apathetic communications medium into a demos – a people” defined by shared culture, values and aspirations (p. 10). This idea, in particular, I can identify with.
Assange’s description of how digital communication is “non-linear” and compromises traditional power relations is excellent. He notes that relations defined by physical resources and technology (unlike information), however, continue to be static (p. 67). I highlight this as important for the following reason. It profoundly strengthens the hypothesis that state power will also eventually recede and collapse in the physical world, with the spread of personal factories and personal enhancement technologies (analogous to personal computers) like 3-d printers and synthetic life-forms, as explained in my own techno-liberation thesis and in the work of theorists like Yannick Rumpala.
When Google Met Wikileaks tells, better than any other text, the story of the clash of philosophies between Google and WikiLeaks – despite Google’s Eric Schmidt assuring Assange that he is “sympathetic to you, obviously”. Specifically, Assange draws our attention to the worryingly close relationship between Google and the militarized US police state in the post-9/11 era. Fittingly, large portions of the book (p. 10–16, 205–220) are devoted to giving Assange’s account of the now exposed world-molesting US regime’s war on WikiLeaks and its cowardly attempts to stifle transparency and accountability.
The publication of When Google Met WikiLeaks is really a reaction to Google chairman Eric Schmidt’s 2013 book The New Digital Age (2013), co-authored with Google Ideas director Jared Cohen. Unfortunately, I have not studied that book, although I intend to pen a fitting enough review for it in due course to follow on from this review. It is safe to say that Assange’s own review in the New York Times in 2013 was quite crushing enough. However, nothing could be more devastating to its pro-US thesis than the revelations of widespread illegal domestic spying exposed by Edward Snowden, which shook the US and the entire world shortly after The New Digital Age’s very release.
Assange’s review of The New Digital Age is reprinted in his book (p. 53–60). In it, he describes how Schmidt and Cohen are in fact little better than State Department cronies (p. 22–25, 32, 37–42), who first met in Iraq and were “excited that consumer technology was transforming a society flattened by United States military occupation”. In turn, Assange’s review flattens both of these apologists and their feeble pretense to be liberating the world, tearing their book apart as a “love song” to a regime, which deliberately ignores the regime’s own disgraceful record of human rights abuses and tries to conflate US aggression with free market forces (p. 201–203).
Cohen and Schmidt, Assange tells us, are hypocrites, feigning concerns about authoritarian abuses that they secretly knew to be happening in their own country with Google’s full knowledge and collaboration, yet did nothing about (p. 58, 203). Assange describes the book, authored by Google’s best, as a shoddily researched, sycophantic dance of affection for US foreign policy, mocking the parade of praise it received from some of the greatest villains and war criminals still at large today, from Madeleine Albright to Tony Blair. The authors, Assange claims, are hardly sympathetic to the democratic internet, as they “insinuate that politically motivated direct action on the internet lies on the terrorist spectrum” (p. 200).
As with Cypherpunks, most of Assange’s book consists of a transcript based on a recording that can be found at WikiLeaks, and in drafting this review I listened to the recording rather than reading the transcript in the book. The conversation moves in what I thought to be three stages, the first addressing how WikiLeaks operates and the kind of politically beneficial journalism promoted by WikiLeaks. The second stage of the conversation addresses the good that WikiLeaks believes it has achieved politically, with Assange claiming credit for a series of events that led to the Arab Spring and key government resignations.
When we get to the third stage of the conversation, something of a clash becomes evident between the Google chairman and WikiLeaks editor-in-chief, as Schmidt and Cohen begin to posit hypothetical scenarios in which WikiLeaks could potentially cause harm. The disagreement evident in this part of the discussion is apparently shown in Schmidt and Cohen’s book: they alleged that “Assange, specifically” (or any other editor) lacks sufficient moral authority to decide what to publish. Instead, we find special pleading from Schmidt and Cohen for the state: while regime control over information in other countries is bad, US regime control over information is good (p. 196).
According to the special pleading of Google’s top executives, only one regime – the US government and its secret military courts – has sufficient moral authority to make decisions about whether a disclosure is harmful or not. Assange points out that Google’s brightest seem eager to avoid explaining why this one regime should have such privilege, and others should not. He writes that Schmidt and Cohen “will tell you that open-mindedness is a virtue, but all perspectives that challenge the exceptionalist drive at the heart of American foreign policy will remain invisible to them” (p. 35).
Assange makes a compelling argument that Google is not immune to the coercive power of the state in which it operates. We need to stop mindlessly chanting “Google is different. Google is visionary. Google is the future. Google is more than just a company. Google gives back to the community. Google is a force for good” (p. 36). It’s time to tell it how it is, and Assange knows just how to say it.
Google is becoming a force for bad, and is little different from any other massive corporation led by ageing cronies of the narrow-minded state that has perpetrated the worst outrages against the open and democratic internet. Google “Ideas” are myopic, close-minded, and nationalist (p. 26), and the corporate-state cronies who think them up have no intention to reduce the number of murdered journalists, torture chambers and rape rooms in the world or criticize the regime under which they live. Google’s politics are about keeping things exactly as they are, and there is nothing progressive about that vision.
To conclude with what was perhaps the strongest point in the book, Assange quotes NYT columnist Tom Friedman. We are warned by Friedman as early as 1999 that Silicon Valley is led less now by the mercurial “hidden hand” of the market than the “hidden fist” of the US state. Assange argues, further, that the close relations between Silicon Valley and the regime in Washington indicate Silicon Valley is now like a “velvet glove” on the “hidden fist” of the regime (p. 43). Similarly, Assange warns those of us of a libertarian persuasion that the danger posed by the state has two horns – one government, the other corporate – and that limiting our attacks to one of them means getting gored on the other. Despite its positive public image, Google’s (and possibly also Facebook’s) ties with the US state for the purpose of monitoring the US pubic deserve a strong public backlash.
/* */